책 이미지

eBook 미리보기
책 정보
· 제목 : Hacking Linux Exposed (Paperback, 2nd, Subsequent) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780072225648
· 쪽수 : 650쪽
· 출판일 : 2002-11-01
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780072225648
· 쪽수 : 650쪽
· 출판일 : 2002-11-01
목차
Part I : Locking into Linux
1: Linux Security Overview
2: Proactive Security Measures
3: Mapping Your Machine and Network
Part II: Breaking In from the Outside
4: Social Engineering, Trojans, and Other Cracker Trickery
5: Physical Attacks
6: Attacking over the Network
7: Advanced Network Attacks
Part III: Local User Attacks
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
2: Proactive Security Measures
3: Mapping Your Machine and Network
Part II: Breaking In from the Outside
4: Social Engineering, Trojans, and Other Cracker Trickery
5: Physical Attacks
6: Attacking over the Network
7: Advanced Network Attacks
Part III: Local User Attacks
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
Part II: Breaking In from the Outside
4: Social Engineering, Trojans, and Other Cracker Trickery
5: Physical Attacks
6: Attacking over the Network
7: Advanced Network Attacks
Part III: Local User Attacks
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
5: Physical Attacks
6: Attacking over the Network
7: Advanced Network Attacks
Part III: Local User Attacks
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
7: Advanced Network Attacks
Part III: Local User Attacks
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
8: Elevating User Privileges
9: Linux Authentication
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
Part IV: Server Issues
10: Mail Security
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
11: File Transfer Protocol Security
12: Web Servers and Dynamic Content
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
13: Access Control and Firewalls
14: Denial of Service Attacks
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
Part V: After a Break-In
15: Covert Access
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
16: Back Doors
17: Advanced System Abuse
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
Part VI: Appendixes
A: Discovering and Recovering from an Attack
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
B: Keeping Your Programs Current
C: Turning Off Unneeded Software
D: Case Studies
D: Case Studies
추천도서
분야의 베스트셀러 >